CN105426727A - Fingerprint decryption method and mobile terminal - Google Patents
Fingerprint decryption method and mobile terminal Download PDFInfo
- Publication number
- CN105426727A CN105426727A CN201510962840.0A CN201510962840A CN105426727A CN 105426727 A CN105426727 A CN 105426727A CN 201510962840 A CN201510962840 A CN 201510962840A CN 105426727 A CN105426727 A CN 105426727A
- Authority
- CN
- China
- Prior art keywords
- user
- finger print
- print information
- decrypted
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000005516 engineering process Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009432 framing Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The embodiment of the invention provides a fingerprint decryption method which includes the steps that fingerprint information of a first user and/or fingerprint information of a second user are/is received; according to the received fingerprint information of the first user and/or the fingerprint information of the second user, an object to be decrypted is decrypted to obtain user authorities, in different levels, of the object to be decrypted, wherein the object to be decrypted is encrypted through combined information of the preset fingerprint information of the first user and the preset fingerprint information of the second user. The embodiment of the invention further relates to a mobile terminal.
Description
Technical field
The present invention relates to fingerprint identification technology field, particularly relate to a kind of fingerprint decryption method and mobile terminal.
Background technology
Existing mobile terminal, such as the Mobile solution of intelligence energy mobile phone etc. is more and more abundanter, mobile terminal has increasing financial function, such as mobile payment, stored value card etc., store more individual privacy and significant data inside mobile terminal, therefore the security of mobile terminal is had higher requirement.
At present, the method be encrypted the data of mobile terminal is normally at input through keyboard picture and text password or word password, and the true and false of this encryption method None-identified user, and when user uses in public, very easily divulging a secret, security is not enough.
Summary of the invention
In view of this, the fingerprint decryption method being necessary to provide a kind of security higher and mobile terminal,
A kind of fingerprint decryption method, receives the finger print information of first user and/or receives the finger print information of the second user; Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
A kind of mobile terminal, comprise: comprise housing, the display screen be arranged on housing, be arranged on the circuit board in housing and be electrically connected storer and the processor of described circuit board, described storer is in order to store executable data, described processor in order to perform the data in described storer, with
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
Compared with prior art, in the fingerprint decryption method in the embodiment of the present invention and mobile terminal, receive the finger print information of first user and/or receive the finger print information of the second user; Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user, treat decrypt objects by finger print information to be decrypted, improve security.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment, description below, apparently, accompanying drawing in the following describes is only some embodiments of the embodiment of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The schematic flow sheet of the fingerprint decryption method that Fig. 1 provides for the embodiment of the present invention.
The structural framing schematic diagram of the mobile terminal that Fig. 2 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only embodiment of the present invention part embodiment, instead of whole embodiments.Based on the embodiment in the embodiment of the present invention, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of embodiment of the present invention protection.
Fig. 1 is the schematic flow sheet of the fingerprint decryption method of the embodiment of the present invention.As shown in Figure 1, the method comprises:
S110, the finger print information of reception first user and/or the finger print information of reception the second user;
The finger print information of first user that S120, basis receive and/or the finger print information of the second user are treated decrypt objects and are decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
In the present embodiment, step S110 can be divided into three kinds of different reception conditions, comprising: the finger print information receiving only first user; Receive only the finger print information of the second user and receive the finger print information of first user and the finger print information of the second user.
In the present embodiment, by the combined information cryptographic object of the finger print information of the finger print information and the second user that pre-set first user, obtain object to be decrypted and store.The embodiment of the present invention can be applied to any occasion needing encrypting and decrypting, and such as mobile terminal unlocks, and account logs in, and pays and switch the mode of operation of mobile terminal, operating system, wallpaper, theme etc.Described object to be decrypted includes but not limited to application program, document, file.
Alternatively, the finger print information of the first user that described basis receives and/or the finger print information of the second user are treated decrypt objects and are decrypted, and to obtain the user right of the different stage to described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right.
The combined information of the finger print information of described first user and the finger print information of the second user can be the weighted array of the unique point that the Partial Feature point extracted from the finger print information of the some of first user or multiple finger extracts with the finger print information from the some of the second user or multiple finger.Certainly, described combined information also can be the whole unique point from the finger print information of the some of first user or multiple finger and the weighted array of whole unique points of the finger print information from the some of the second user or multiple finger.
In the present embodiment, when the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach default matching condition, decrypt objects will be treated and be decrypted to obtain first user authority.Particularly, if the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2, wherein A, B can be respectively number percent, and K1, K2 are respectively the characteristic point data taking from first user and the characteristic point data taking from the second user.Described number percent can be self-defined.For example, if A is 40%, B is 60%, the matching condition then preset is 40%*K1+60%*K2, and when the finger print information of the first user received reaches 30%K1, namely, when A in the A*K1 of the finger print information of the first user received is more than 1/2nd A, decrypt objects will be treated be decrypted to obtain first user authority, or when the finger print information of the first user received reaches A*K1, just treat decrypt objects and be decrypted to obtain first user authority.
Similarly, matching condition can be arranged to when the finger print information of the second user received reaches 40%K2, namely, when B ultrasonic in the finger print information B*K2 of the second user received crosses 1/2nd B, decrypt objects will be treated be decrypted to obtain the second user right, or when the finger print information of the second user received reaches B*K2, just treat decrypt objects deciphering.
Described first user authority can be arranged to identical with described second user right, and described first user authority and described second user right also can be arranged to difference, and such as, when A is greater than B, described first user authority is greater than described second user right; When A is less than B, described first user authority is less than described second user right.
Alternatively, described first user authority can in order to control described first user authority in order to control described first user with the described object to be decrypted of first user authority access; Or described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.Described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
Alternatively, the finger print information of the first user that described basis receives and/or the finger print information of the second user are treated decrypt objects and are decrypted, to obtain the user right to the different stage of described object to be decrypted, comprise: by the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user; When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right.
Particularly, if the combined information of the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2.So, when A and B meets corresponding condition simultaneously, decrypt objects will be treated and be decrypted to obtain the 3rd user right.Such as, when the finger print information of the first user received reaches A*K1 and reaches B*K2 when the finger print information of the second user received, just treat decrypt objects and be decrypted.Wherein, described 3rd user right is in order to control described first user and described second user accesses object to be decrypted with the 3rd user right.Described 3rd user right can higher than described first user authority and described second user right.Wherein, described 3rd user right is higher than described first user authority and described second user right.
Further, the finger print information of first user when receiving and the finger print information of the second user can also be arranged to, mate with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, just treat decrypt objects to be decrypted, to obtain the 3rd user right.
Alternatively, receive the finger print information of described first user and receive the finger print information of described second user, comprising: the finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.Such as, be greater than the first predetermined threshold value T.T. when input first user finger print information and the second user fingerprints information, be judged to be that the fingerprint inputted does not belong to once inputting.Such as, input was more than 3 seconds, and the fingerprint of the input thought after 3 seconds does not belong to the fingerprint content of this deciphering input.
Alternatively, receive the finger print information of described first user and receive the finger print information of described second user, comprising: the time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.When adjacent twice fingerprint input interval greater than the second predetermined threshold value time, judge that the finger print information of first user and the finger print information of the second user of input do not belong to once inputting, or when judging to decipher, the finger print information of first user of input is different from the fingerprint combined information preset with the finger print information of the second user.
Alternatively, receive the finger print information of first user and receive the finger print information of the second user, comprise: accept the finger print information of first user simultaneously and accept the finger print information of the second user, otherwise, be judged to not belong to once inputting, or the finger print information of first user inputted when judging deciphering is different from the fingerprint combined information preset with the finger print information of the second user.
In fingerprint decryption method in the embodiment of the present invention, receive the finger print information of first user and/or receive the finger print information of the second user; Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user, treat decrypt objects by finger print information to be decrypted, improve security.
Refer to Fig. 2, Fig. 2 is the structural representation of the mobile terminal 200 in the embodiment of the present invention.Described mobile terminal 200, comprise housing 210, be arranged on the display screen 220 on housing 210, connect the circuit board 230 of display screen 220 and be electrically connected storer 240 and the processor 250 of described circuit board 230, described storer 240 for storing instruction, described processor 250 in order to perform instruction in described storer 240 with:
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
Described mobile terminal 200 can be the electronic equipment that mobile phone, panel computer, personal digital assistant etc. possess communication function.Described housing 210 can be the combination of plastic housing, betal can or plastic housing and betal can, and the material of described housing 210 is not construed as limiting in the present invention.
Described display screen 220 can be light emitting diode (LED) display screen or organic light-emitting diode (OLED) display screen.Described display screen 220 can in order to the interface of display application program.
Described storer 240 in order to deposit executable data, program or instruction, to realize man-machine interaction.Described processor 250 is in order to perform described executable program.Storer 240 can comprise ROM (read-only memory) and random access memory, and provides instruction and data to processor 250.A part for storer 250 can also comprise non-volatile row random access memory (NVRAM).Described processor 250 can also be called CPU (CentralProcessingUnit, CPU (central processing unit)).
In the present embodiment, the finger print information of described reception first user and/or the finger print information of reception the second user, can be divided into the reception condition that three kinds different, comprise: the finger print information receiving only first user; Receive only the finger print information of the second user and receive the finger print information of first user and the finger print information of the second user.
In the present embodiment, described processor 250 performs described data with the combined information cryptographic object of the finger print information of the finger print information by pre-setting first user and the second user, obtains object to be decrypted and stores.The embodiment of the present invention can be applied to any occasion needing encrypting and decrypting, and such as mobile terminal unlocks, and account logs in, and pays and switch the mode of operation of mobile terminal, operating system, wallpaper, theme etc.Described object to be decrypted includes but not limited to application program, document, file.
Alternatively, described processor 250 performs described data and is decrypted to treat decrypt objects according to the finger print information of first user received and/or the finger print information of the second user, to obtain the user right of the different stage to described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right.
The combined information of the finger print information of described first user and the finger print information of the second user can be the weighted array of the unique point that the Partial Feature point extracted from the finger print information of the some of first user or multiple finger extracts with the finger print information from the some of the second user or multiple finger.Certainly, described combined information also can be the whole unique point from the finger print information of the some of first user or multiple finger and the weighted array of whole unique points of the finger print information from the some of the second user or multiple finger.
In the present embodiment, described processor 250 performs described data with when the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach default matching condition, will treat decrypt objects and be decrypted to obtain first user authority.Particularly, if the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2, wherein A, B can be respectively number percent, and K1, K2 are respectively the characteristic point data taking from first user and the characteristic point data taking from the second user.Described number percent can be self-defined.For example, if A is 40%, B is 60%, the matching condition then preset is 40%*K1+60%*K2, and when the finger print information of the first user received reaches 30%K1, namely, when A in the A*K1 of the finger print information of the first user received is more than 1/2nd A, decrypt objects will be treated be decrypted to obtain first user authority, or when the finger print information of the first user received reaches A*K1, just treat decrypt objects and be decrypted to obtain first user authority.
Similarly, matching condition can be arranged to when the finger print information of the second user received reaches 40%K2 by described processor 250, namely, when B ultrasonic in the finger print information B*K2 of the second user received crosses 1/2nd B, decrypt objects will be treated be decrypted to obtain the second user right, or when the finger print information of the second user received reaches B*K2, just treat decrypt objects deciphering.
Described first user authority can be arranged to identical with described second user right, and described first user authority and described second user right also can be arranged to difference, and such as, when A is greater than B, described first user authority is greater than described second user right; When A is less than B, described first user authority is less than described second user right.
Alternatively, described first user authority can in order to control described first user authority in order to control described first user with the described object to be decrypted of first user authority access; Or described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.Described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
Alternatively, described processor 250 performs described data and is decrypted to treat decrypt objects according to the finger print information of first user received and/or the finger print information of the second user, to obtain the user right to the different stage of described object to be decrypted, comprise: by the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user; When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right.
Particularly, if the combined information of the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2.So, when A and B meets corresponding condition simultaneously, decrypt objects will be treated and be decrypted to obtain the 3rd user right.Such as, when the finger print information of the first user received reaches A*K1 and reaches B*K2 when the finger print information of the second user received, just treat decrypt objects and be decrypted.Wherein, described 3rd user right is in order to control described first user and described second user accesses object to be decrypted with the 3rd user right.Described 3rd user right can higher than described first user authority and described second user right.Wherein, described 3rd user right is higher than described first user authority and described second user right.
Further, described processor 250 performs described data to be set to when the finger print information of first user that receive and the finger print information of the second user, mate with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, just treat decrypt objects to be decrypted, to obtain the 3rd user right.
Alternatively, described processor 250 performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising: the finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.Such as, be greater than the first predetermined threshold value T.T. when input first user finger print information and the second user fingerprints information, be judged to be that the fingerprint inputted does not belong to once inputting.Such as, input was more than 3 seconds, and the fingerprint of the input thought after 3 seconds does not belong to the fingerprint content of this deciphering input.
Alternatively, described processor 250 performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising: the time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.When adjacent twice fingerprint input interval greater than the second predetermined threshold value time, judge that the finger print information of first user and the finger print information of the second user of input do not belong to once inputting, or when judging to decipher, the finger print information of first user of input is different from the fingerprint combined information preset with the finger print information of the second user.
Alternatively, described processor 250 performs described data to receive the finger print information of first user and to receive the finger print information of the second user, comprise: accept the finger print information of first user simultaneously and accept the finger print information of the second user, otherwise, be judged to not belong to once inputting, or the finger print information of first user inputted when judging deciphering is different from the fingerprint combined information preset with the finger print information of the second user.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.
Claims (18)
1. a fingerprint decryption method, comprising:
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
2. fingerprint decryption method as claimed in claim 1, is characterized in that, receives the finger print information of described first user and receives the finger print information of described second user, comprising:
The finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.
3. fingerprint decryption method as claimed in claim 1, is characterized in that, receives the finger print information of described first user and receives the finger print information of described second user, comprising:
The time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.
4. fingerprint decryption method as claimed in claim 1, is characterized in that, receives the finger print information of first user and receives the finger print information of the second user, comprising:
Accept the finger print information of first user simultaneously and accept the finger print information of the second user.
5. the fingerprint decryption method as described in claim 1-4 any one, it is characterized in that, the finger print information of the first user that described basis receives and/or the finger print information of the second user are treated decrypt objects and are decrypted, to obtain the user right to the different stage of described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right; Or
By the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user;
When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right, wherein, described 3rd user right is higher than described first user authority and described second user right.
6. fingerprint decryption method as claimed in claim 5, it is characterized in that, when the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right, comprising:
When the finger print information of the first user received and the finger print information of the second user, match with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, treat unlocking objects to be decrypted, to obtain the 3rd user right.
7. fingerprint decryption method as claimed in claim 5, is characterized in that, described first user authority is in order to control described first user with the described object to be decrypted of first user authority access; Or
Described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.
8. fingerprint decryption method as claimed in claim 5, is characterized in that, described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or
Described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
9. as the fingerprint decryption method in claim 5-8 as described in any one, it is characterized in that, described first user authority is identical with described second user right, or described first user authority is different from described second user right.
10. a mobile terminal, comprise housing, the display screen be arranged on housing, be arranged on the circuit board in housing and be electrically connected storer and the processor of described circuit board, described storer in order to store executable data, described processor in order to perform the data in described storer, with
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
11. mobile terminals as claimed in claim 10, is characterized in that, described processor performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising:
The finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.
12. mobile terminals as claimed in claim 10, is characterized in that, described processor performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising:
The time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.
13. mobile terminals as claimed in claim 10, is characterized in that, described processor performs described data to receive the finger print information of first user and to receive the finger print information of the second user, comprising:
Accept the finger print information of first user simultaneously and accept the finger print information of the second user.
14. mobile terminals as described in claim 11-13 any one, it is characterized in that, described processor performs described data and is decrypted to treat decrypt objects according to the finger print information of first user received and/or the finger print information of the second user, to obtain the user right to the different stage of described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right; Or
By the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user;
When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right, wherein, described 3rd user right is higher than described first user authority and described second user right.
15. mobile terminals as claimed in claim 14, it is characterized in that, described processor is provided with when the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition described in performing, treat decrypt objects to be decrypted, to obtain the 3rd user right, comprising:
When the finger print information of the first user received and the finger print information of the second user, match with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, treat unlocking objects to be decrypted, to obtain the 3rd user right.
16. mobile terminals as claimed in claim 14, is characterized in that, described first user authority is in order to control described first user with the described object to be decrypted of first user authority access; Or
Described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.
17. mobile terminals as claimed in claim 14, is characterized in that, described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or
Described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
18. mobile terminals as described in claim 10-17 any one, it is characterized in that, described first user authority is identical with described second user right, or described first user authority is different from described second user right.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510962840.0A CN105426727B (en) | 2015-12-17 | 2015-12-17 | Fingerprint decryption method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510962840.0A CN105426727B (en) | 2015-12-17 | 2015-12-17 | Fingerprint decryption method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105426727A true CN105426727A (en) | 2016-03-23 |
CN105426727B CN105426727B (en) | 2019-02-05 |
Family
ID=55504932
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510962840.0A Expired - Fee Related CN105426727B (en) | 2015-12-17 | 2015-12-17 | Fingerprint decryption method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105426727B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106127004A (en) * | 2016-06-21 | 2016-11-16 | 广东欧珀移动通信有限公司 | A kind of document handling method and terminal unit |
CN106295368A (en) * | 2016-08-17 | 2017-01-04 | 四川长虹通信科技有限公司 | The data security protection method of a kind of mobile terminal and system |
CN107454251A (en) * | 2017-07-13 | 2017-12-08 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
CN110276206A (en) * | 2019-06-10 | 2019-09-24 | Oppo广东移动通信有限公司 | The inspection method of encrypted content and check system |
CN110990849A (en) * | 2019-11-20 | 2020-04-10 | 维沃移动通信有限公司 | Encryption and decryption method for private data and terminal |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1985260A (en) * | 2005-08-04 | 2007-06-20 | 株式会社知识潮 | Computer controlling method and system by externally connected device |
CN102576399A (en) * | 2009-10-20 | 2012-07-11 | 微软公司 | Resource access based on multiple credentials |
CN202662026U (en) * | 2012-06-05 | 2013-01-09 | 上海锦江电子技术工程有限公司 | Multi-face recognition system |
CN104036177A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Intelligent terminal fingerprint unlocking device and method |
CN104331653A (en) * | 2014-10-20 | 2015-02-04 | 深圳市汇顶科技股份有限公司 | Fingerprint decryption method and fingerprint decryption device |
CN104537290A (en) * | 2014-12-18 | 2015-04-22 | 无敌科技(西安)有限公司 | Password system and achievement method based on multi-fingerprint identification |
US20150137938A1 (en) * | 2013-11-15 | 2015-05-21 | Motorola Mobility Llc | Method and Apparatus for Authenticating Access to a Multi-Level Secure Environment of an Electronic Device |
-
2015
- 2015-12-17 CN CN201510962840.0A patent/CN105426727B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1985260A (en) * | 2005-08-04 | 2007-06-20 | 株式会社知识潮 | Computer controlling method and system by externally connected device |
CN102576399A (en) * | 2009-10-20 | 2012-07-11 | 微软公司 | Resource access based on multiple credentials |
CN202662026U (en) * | 2012-06-05 | 2013-01-09 | 上海锦江电子技术工程有限公司 | Multi-face recognition system |
US20150137938A1 (en) * | 2013-11-15 | 2015-05-21 | Motorola Mobility Llc | Method and Apparatus for Authenticating Access to a Multi-Level Secure Environment of an Electronic Device |
CN104036177A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Intelligent terminal fingerprint unlocking device and method |
CN104331653A (en) * | 2014-10-20 | 2015-02-04 | 深圳市汇顶科技股份有限公司 | Fingerprint decryption method and fingerprint decryption device |
CN104537290A (en) * | 2014-12-18 | 2015-04-22 | 无敌科技(西安)有限公司 | Password system and achievement method based on multi-fingerprint identification |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106127004A (en) * | 2016-06-21 | 2016-11-16 | 广东欧珀移动通信有限公司 | A kind of document handling method and terminal unit |
CN106127004B (en) * | 2016-06-21 | 2019-04-05 | Oppo广东移动通信有限公司 | A kind of document handling method and terminal device |
CN106295368A (en) * | 2016-08-17 | 2017-01-04 | 四川长虹通信科技有限公司 | The data security protection method of a kind of mobile terminal and system |
CN107454251A (en) * | 2017-07-13 | 2017-12-08 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
CN107454251B (en) * | 2017-07-13 | 2020-06-05 | Oppo广东移动通信有限公司 | Unlocking control method and related product |
CN110276206A (en) * | 2019-06-10 | 2019-09-24 | Oppo广东移动通信有限公司 | The inspection method of encrypted content and check system |
CN110276206B (en) * | 2019-06-10 | 2021-03-23 | Oppo广东移动通信有限公司 | Viewing method and viewing system for encrypted content |
CN110990849A (en) * | 2019-11-20 | 2020-04-10 | 维沃移动通信有限公司 | Encryption and decryption method for private data and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105426727B (en) | 2019-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10565357B2 (en) | Method for securely transmitting a secret data to a user of a terminal | |
Sabzevar et al. | Universal multi-factor authentication using graphical passwords | |
US10146983B2 (en) | Fingerprint decryption method and device | |
CN100383693C (en) | Method of confirming a secure key exchange | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN105426727A (en) | Fingerprint decryption method and mobile terminal | |
US20100313028A1 (en) | Electronic Signature Method and Electronic Signature Tool | |
CN104992119B (en) | A kind of safe transmission method and system of sensitive information Anti-theft | |
CN102419805A (en) | Terminal equipment and method for encrypting user information | |
CN104978512A (en) | Password input and confirmation method and system thereof | |
CN104933343A (en) | Secrecy method and apparatus of application program, and electronic device | |
CN101695066A (en) | Security authentication method and information security authentication equipment | |
CN103401771A (en) | Network isolation method and network isolation system | |
CN105933503B (en) | Information processing method and electronic equipment | |
US20190258829A1 (en) | Securely performing a sensitive operation using a non-secure terminal | |
CN104915583A (en) | Interface decryption processing method and mobile terminal | |
CN106797381B (en) | Communication adapter for user authentication | |
CN105450402A (en) | Method, device and system for inputting combined-type image verification code | |
KR101392537B1 (en) | User memory method using plural one time password | |
KR102375973B1 (en) | Security server using case based reasoning engine and storage medium for installing security function | |
EP3319000A1 (en) | Method for securing a transaction performed from a non-secure terminal | |
EP3319067A1 (en) | Method for authenticating a user by means of a non-secure terminal | |
EP3319001A1 (en) | Method for securely transmitting a secret data to a user of a terminal | |
EP3319068A1 (en) | Method for securely transmitting a secret data to a user of a terminal | |
KR20090013616A (en) | Server certification system and method using server certification code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190205 |